Sciweavers

1811 search results - page 308 / 363
» Facilitation, Systems, and Users: The Complete Socio-Technic...
Sort
View
BMCBI
2006
182views more  BMCBI 2006»
13 years 8 months ago
A database and tool, IM Browser, for exploring and integrating emerging gene and protein interaction data for Drosophila
Background: Biological processes are mediated by networks of interacting genes and proteins. Efforts to map and understand these networks are resulting in the proliferation of int...
Svetlana Pacifico, Guozhen Liu, Stephen Guest, Jod...
CN
2006
61views more  CN 2006»
13 years 8 months ago
Structuring topologically aware overlay networks using domain names
Abstract-- Overlay networks are application layer systems which facilitate users in performing distributed functions such as searches over the contents of other users. An important...
Demetrios Zeinalipour-Yazti, Vana Kalogeraki
ACSC
2006
IEEE
14 years 2 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ISMIR
2000
Springer
146views Music» more  ISMIR 2000»
13 years 11 months ago
Perceptual and Cognitive Applications in Music Information Retrieval
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
David Huron
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 9 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...